Card3000 - courses.cs.washington.edu

22
Card3000 Ajay Alfred, Shawn Callegari, Mike Hotan, Ravi Pinjala

Transcript of Card3000 - courses.cs.washington.edu

Page 1: Card3000 - courses.cs.washington.edu

Card3000Ajay Alfred,Shawn Callegari,Mike Hotan,Ravi Pinjala

Page 2: Card3000 - courses.cs.washington.edu

Contents

1. Problem and Solution Overview2. Contextual inquiry Participants3. Contextual inquiry Results

a. Availability and Awarenessb. Incentivesc. Usability / Digestibilityd. Security / Accountability

4. Task analysis questions5. Three tasks

a. Task 1 ­ Making a quick payment (Easy)b. Task 2 ­ Dealing with an overdraft on the payment card (Medium)c. Task 3 ­ Reporting fraudulent transactions (Hard)

6. Storyboards for our initial designsa. Design 1b. Design 2c. Design 3

7. Selected Interface Designa. Reasoningb. Functionality summaryc. User interface description

8. Three scenarios corresponding to tasks

Page 3: Card3000 - courses.cs.washington.edu

Problem and Solution Overview

When you think about it, credit cards are pretty terrible. They are horribly insecure, requiring noauthentication at all to use. What little security they have is completely reactive ­ if you or your creditcard company notices that something is amiss, you can cancel the card, hopefully before too muchdamage has been done. We should expect better from something that’s tied to our bank accounts! Onthe other hand, credit cards also have some advantages: people are familiar with how they work, they’rereally simple to use, and they’re easy to carry around.

We would like to propose something new, which maintains the positive aspects of credit cards, butdramatically improves their security and flexibility. Our Card3000 system is a hardware platform forsoftware­defined credit cards, which keeps the same form factor as plastic credit cards, and maintainscompatibility with magnetic stripe readers. The hardware may be a bit beyond what can bemanufactured today, but when you look at current hardware trends, it’s entirely possible that it could bebuilt within the next decade.

Page 4: Card3000 - courses.cs.washington.edu

Contextual inquiry Participants

Vi is a college student in her early 30’s. Although she is an avid bargain shopper, she does not use herphone to make in store mobile payments. She approaches in­store payments from a more traditionalstandpoint. She uses credit cards to make larger purchases because she feels that it is necessary tohave some form of accountability post purchase. She maintains a credit card and debit card in herwallet for her day to day activities. She is very conscious about maintaining a conservative spendingbehavior. She would like faster access to security and accountability details about her credit accountsafter a purchase.

Ian is in his mid 20’s, and is a software engineer. He has moved into a new household and has beenrecently making more in store purchases. He usually shops online because he likes to referencereviews. Because he is shopping for physical content that he looks to place in his home, he appreciatesthe ability to view items in store and purchase items without having to pay daunting shipping cost.Whether it be online or in store, Ian appreciates the ability to apply royalty benefits per purchase. Ian isalso very aware of the security vulnerabilities of modern magnetic stripe credit cards. Despite theawareness, he decides to continue to use his credit cards in trusted establishments.

Craig is a 25 year old Electrical Engineer working for a robotics company. He is a gadget enthusiast,and is always up­to­date with the latest technology. He is also a minimalist and tries to reduce the clutterin his life. Craig would love to reduce the number of cards he carries in his wallet by moving to an alldigital wallet system, but he carries an iPhone which does not support NFC payments. He does use hisphone wherever possible, to store loyalty cards and membership numbers, and passwords. Fortunately,Starbucks has a mobile payment solution that works well on Craig’s iPhone, which means one less cardin his wallet. He uses the app for all Starbucks purchases, and he enjoys the fact that he can also checkhis balance and top it up as needed.

Page 5: Card3000 - courses.cs.washington.edu

Contextual inquiry Results

Availability and Awareness

There are many different kinds of in store payment options. There are so many that it is difficult formerchants to support all of them. It is also too difficult for consumers understand when and where touse these specialized systems. Vi and Ian are both interested in making mobile payment their prioritypayment method. They are both looking for a more secure payment system. The main issue theybrought up was that most merchants either didn’t support such systems or do not know they supportedsuch systems. For example, while conducting our contextual inquiry with Vi, the cashiers at McDonaldshad no idea that customers could pay with NFC. Vi does not actively look for these non traditionalpayment systems. Ian is actively engaged with new technology and looks for these locations. However,Ian is constrained by his smartphone. His phone is too troublesome to set up for non traditional mobilepayment systems.

On the other hand, Craig does everything he can to avoid carrying credit cards. He wishes that morestores used mobile payment options. Craig uses the Starbucks mobile application to make mobilepayments. This constrains him to only be able to make payments with Starbucks. Associating a mobileapplication to the merchant that produced the application ensures that the payment method exist.However, having every merchant have their own application is extremely cumbersome for consumers.Our participants, with the exception of Craig, were more likely to resort to traditional payment methodsthan to add another application to their smartphone. The lack of availability and standardization hasdeterred a majority of our participants from using non traditional payment systems.

Incentives

Craig demonstrated how Starbucks incorporates a loyalty program within the application itself. Craigwas able link credit cards and preloaded Starbucks cards. This allowed him to earn credit for everypurchase. The Starbucks process is relatively simple, Craig was able to easily open the application andshow a barcode to pay. Craig appreciates how the application automatically linked to his Starbucksaccount, seamlessly updated his royalty status.

Vi and Ian both used NFC based service to make payments. Ian pointed out that NFC did not provideany incentive that relates to royalty accounts. They both carry as few cards as possible in order toavoid running up a lot of credit card debt. They were pleased with the ability to switch betweenaccounts without worrying about which card to leave at home. It was obvious that a smartphone’sability to store and manipulate data can be highly beneficial for both consumers and merchants. Ourparticipants all would like pervasive integration of loyalty programs and promotional accounts into every

Page 6: Card3000 - courses.cs.washington.edu

purchase they make. Credit cards are static, therefore they can only provide incentives that tie directlyto the credit card itself. Our participants want to see incentives that tie directly to merchants.

Usability / Digestibility

For all three participants the functionality of paying with credit cards was instinctive. All three are ableto pay with physical credit cards almost effortlessly. Credit cards have become a modern day essentialfor making impulsive or relatively large payments. Vi and Ian both expressed that a reason theycontinue to use physical credit cards is that they understand the entire transaction. Even though both ofthem didn’t necessarily like physical cards, it was just the most convenient. Craig was clear that eventhough he knew how to use plastic credit cards he did everything in his power to use his smartphone.

A key difference we found was in the variations of representations between mobile and credit cards.Credit cards vary minutely compared to the interfaces that are presented on mobile payment systems.Mobile interfaces vary relatively greatly depending on the application and operating system. Ian andCraig were both technical savvy, therefore learning new user interfaces is not as much of a hinderanceas it is for Vi. Initially, she had no idea when her phone was ready for the NFC transaction. GoogleWallet’s interface was relatively simple, but it was difficult for a non experienced user to learn when totap to pay. This presents a common problem that is arising out of the prominence of different types ofpayment methods. The variation of interfaces makes non traditional payment systems lessapproachable.

Security / Accountability

Ian and Vi both had concerns about credit security. Ian is very aware of the vulnerabilities of modernday magnetic strips and credit card numbers. Vi is generally aware of these vulnerabilities. Craig wasnot concerned at all. Craig was comfortable with the credit card companies ability to insure falsetransactions. The concern over security varied through our participants.

However, all the participants were concerned with some level of accountability. Ian collects receipts fortax purposes. Vi collects receipts for strict accountability purposes. Craig collects receipts when hemight need to return something. All of them check their transaction history at least once a week. Thisshows that there is a desire for real time assurance and credit awareness.

Task analysis questions

1. Who is going to use the system?

Page 7: Card3000 - courses.cs.washington.edu

Everybody who currently uses a credit card could benefit from our system. This covers most peoplethese days, since credit cards are widely used. Our system would not be used by people who pay forthings with cash.

2. What tasks do they now perform?

Overwhelmingly, the most common task people perform with credit cards is the simple paymentscenario ­ handing their card to a cashier, and having the cashier ring up a purchase. Online purchasesare also common these days, and those should be treated as a distinct task, since the workflow is verydifferent. Less common tasks covered by our system are looking at transactions, which people normallydo through their bank, and securing a card, which is normally done by calling the credit card companyon the phone.

3. What tasks are desired?

People want to be able to pay for things, fundamentally. Beyond that, they want the process to gosmoothly (without having to think too much), they want everything to happen quickly, and they want theprotocols involved to be secure. They also want to have the option to receive receipts, for scenarioswhere they later decide that they want to return an item and need proof that they purchased it, but inmost cases receipts aren’t desired.

4. How are the tasks learned?

Paying for things with a credit card is a pretty fundamental life skill, so people usually learn it from theirparents as they’re growing up.

5. Where are the tasks performed?

People pay for things in a variety of ways ­ in stores and restaurants, online, through the mail, and evenover the phone occasionally.

6. What’s the relationship between customer & data?

There are three parties involved in a transaction: the buyer, the seller, and the buyer’s bank. And thereare two classes of data: Information about the customer’s account, and information about the individualpurchases. Account data is jointly owned by the buyer and the buyer’s bank, and both have full accessto that data. The seller has limited access to that data, since they need to be able to request paymentsand verify the customer’s remaining balance. Transaction records are owned by the bank (and also

Page 8: Card3000 - courses.cs.washington.edu

tracked by the seller), and visible to all parties. Neither class of data should be visible to anybodyoutside of a given transaction; both account information and transaction records must remain private bydefault.

7. What other tools does the customer have?

Aside from credit cards, cash is another option for paying for things. Cash is different in that it carriesvalue directly, instead of being tied to an account. This leads to very different security properties: cashmakes identity theft impossible, because there’s no account to compromise, but direct theft is muchmore of a problem, because there’s no equivalent to canceling a lost credit card. It’s also clumsier touse to actually pay for things, since making exact change is a manual process. Finally, cash isanonymous, which is important to some people, while credit cards are implicitly tracked by severalparties.

8. How do customers communicate with each other?

Customers don’t generally use these systems to communicate with each other, but they do communicatewith cashiers.

9. How often are the tasks performed?

The exact frequency varies a lot between customers, but it’s not uncommon for people to make severalpurchases per day.

10. What are the time constraints on the tasks?

Purchases need to be completed as quickly as possible, usually on the order of 15­30 seconds. It alsoneeds to be possible to complete the task with very little cognitive load, since in some situations like agrocery store checkout line, both parties to the transaction will be doing other things at the same time.

11. What happens when things go wrong?

There are all kinds of things that can go wrong:­ At the point of sale, if the user has insufficient funds, the transaction will be rejected. The user can fallback to a different payment method.­ If the user loses their card, they will need to cancel it by calling their credit card company. Thecompany sends them a new card, with a different number, and the user receives it a few days later. Untilthen, they are stuck without a card.­ If the user’s account information is stolen, the consequences are mostly the same as loss, plus the thief

Page 9: Card3000 - courses.cs.washington.edu

can use that information to make fraudulent purchases. Either the user or their credit card company willeventually notice this, and cancel the card.­ Without a network connection, no credit card payments can be made. Cashiers can process paymentsover the phone, or customers can use cash or other payment methods.

Page 10: Card3000 - courses.cs.washington.edu

Three tasks

Task 1 - Making a quick payment (Easy)

Shopping has become an integral part of our lives, and so has carrying multiple payment cards. Witheach retailer and financial institution running its own rewards program, the need to carry a bunch ofcards has not helped solve the problem. The checkout process often consists of juggling betweenmultiple cards to ensure that you earn those precious reward points and pay with a card that has thebest rewards program. We believe making a payment shouldn’t be this tedious.

With Card3000, a customer can use a single card for all their payments and reward programs. The firsttask is a testament to just how easy the whole payment process can be. A customer walks up to thecheckout counter to make a payment using Card3000. The card is activated through a biometricsignature and the customer is prompted to activate the card for payment.

Task 2 - Dealing with an overdraft on the payment card (Medium)

Running into an overdraft while making a payment can be embarrassing. And that probably happensbecause payment cards today are static and unhelpful with relaying important information that can avoidsuch situations. Card holders generally have to keep a mental note of how much they can spend on theircard and the problem gets worse with multiple card accounts. Keeping a track of the amount spent andspending limit on each card often involves logging into multiple online web portal to check these detailswhich makes the whole process even more convoluted.

With Card3000, all this information is available on the card when you need it most. A customer cancheck the spending limit for each card through the simple and intuitive gestures of Card3000. This taskwill involve changing the payment method to a different card account since the default card has reachedits spending limit.

Task 3 - Reporting fraudulent transactions (Hard)

Fraudulent transactions happen all the time, and while there’s only so much security that can be built intothe system, catching and reporting such transactions as early as possible can bring us a step closer topreventing financial loss. Currently, the only way to identify if a card has been misused is through theonline web portal or mobile apps that most financial institutions provide. Accessing a list of cardtransactions through them still involves a few too many steps that deters their frequent use. The resultbeing that fraudulent transactions often go unnoticed until its too late.

Page 11: Card3000 - courses.cs.washington.edu

With Card3000, all this information if available at your fingertips. This task involves making an paymentand then looking through a list of card transactions using the intuitive interface of Card3000. If anyfraudulent transactions are found, the cardholder can immediately report them to the bank and evenblock the card for payments. After the bank has blocked the old card and sent a new card, thecustomer must add and activate the new card on Card3000.

Page 12: Card3000 - courses.cs.washington.edu

Storyboards for our initial designs

Design 1A standard magnetic stripe card, with an accompanying back end service and smartphone app. Userpays for purchases using the single card, and then uses the app to choose which credit card eachtransaction is charged to. If no selection is made within a time limit (i.e. 6 hours), the purchase ischarged to the default card.

Page 13: Card3000 - courses.cs.washington.edu

Design 2A programmable magnetic stripe card with an accompanying smartphone app. The card is normally inan inactive state, and cannot be used for purchases. The user activates the card by selecting a paymentcredit card on their smartphone, and holding it near the card. This enables the magnetic stripe andallows the user to make purchases with it as though it were a standard card.

Page 14: Card3000 - courses.cs.washington.edu

Design 3A smart card containing all the logic and security within a device the size of a credit card. This designincludes a programmable magnetic stripe, an NFC chip, and can display linear/2D barcodes, so allmodern payment standards are covered. Interactions are done solely through the card’s touchscreeninterface (no phone or other device needed).

Image 8.3.1 ­ Quick Payment. Steps for making a payment using the Card3000, beginning with thelocked state and ending in an activated card ready to be used for payment.

Page 15: Card3000 - courses.cs.washington.edu

Image 8.3.2 ­ View Recent Transactions & Reporting Fraud.

Page 16: Card3000 - courses.cs.washington.edu

Image 8.3.3 ­ Viewing Card Details. Displays additional card details, including the spending limit andavailable credit.

Selected Interface Design

Our final decision is design three but incorporates some benefits from one and two. All three modelsare represented as a cohesive balance between mobile technology and a physical credit card. Theydifferentiate from each other with how the balance of capability is distributed between the two paymentmediums. We decided on interface design three. Design three uses a single transaction medium, the“smart” credit card:

The card itself will be touch enabled. Users can swipe left and right to switch between cards Users can swipe up and down to see account details about the last visible credit

account Card will be secure and “private enough”

Traditional physical cards have vulnerabilities. These cards display all the content all thetime. Once an adversary obtains a consumer’s card, they are free to extract the dataand make fraudulent charges. This results in the burden of cancelling accounts afterlosing credit cards. Also, consumers frequently hand over physical cards to merchants.Consumers are left with conducting transactions

Card3000 will biometric authenticated and no data will be shown prior to authentication Card 3000 will have an ability to hide non pertinent data when merchants handle

consumer cards Card will not require wireless connection

Page 17: Card3000 - courses.cs.washington.edu

Mobile phones rely on data connectivity. This card will function with and withoutwireless connection.

Display pertinent information See recent transactions in real time Link to receipts

Reasoning

We recognize a couple major reasons why mobile payments has not become pervasive. One is that it isnot ubiquitously available. Currently, consumers have to go out of there way to purchase the phonewith correct capabilities and download additional applications. This is a complication and deterrence.Card3000 utilizes the same payment medium that consumers are familiar with. Subsequently, merchantswould be able to continue to use their current payment infrastructures.

Creating an interface on a physical credit card allows us leverage its familiarity. Using a physical cardallows us to create a more digestible interface. We will design a smart interface utilizing commonfeatures found in physical cards. This allows users to view a familiar visual interface and conduct thesame physical transaction.

We also chose our payment medium for its simplicity. The other designs had more dependency.Having a programmable card and a smartphone requires both to work properly. Having a mobileapplication that relies on a cloud service requires both to work properly. We force consumers to relyon external dependencies. We want Card3000 to feel assuring and reliable to consumers. Thereforechoosing the interface with the least moving parts provides the most comfortable experience.

Functionality summary

Card3000 is a smart card that replaces and functions like all the other payment cards a person mayown. It includes a salient set of features that address multiple aspects of security, convenience andaccountability.

Authentication

Being a one­stop payment instrument that has access to all the financial accounts mandates the need fora strong authentication mechanism. Card3000 implements a biometric authorization mechanism that iseasy to use and secure at the same time. In order to access any of the card account details or to activatethe card for payment, the user must be identified by scanning their fingerprint. Card3000 only works for

Page 18: Card3000 - courses.cs.washington.edu

the account holder and this is ensured by requiring a fingerprint scan at the start of each session. Thecard will auto­lock after a set time period of inactivity or if the user explicitly locks the card.

Activating the card for payment

After authenticating the card holder, Card3000 displays the card details of the default payment card.The user can swipe through a list of card accounts on Card3000 as well. In order to make a payment,the user must select and activate a card for payment. This is done by swiping down on the selected cardto reveal the card activation interface.

After activating the card for payment, the interface displays details of the payment method such as cardnumber, cardholder name, etc. (as found on conventional cards today). Additional card account detailsare unavailable once a card has been activated for payment since making a payment sometimes involveshanding over the card to the cashier to complete the transaction and to avoid revealing sensitive accountinformation to unauthorized users, the card is put into a active, but locked state. The cardholder mustbe authenticated (through a fingerprint scan) again to access transaction and account details.

Accessing multiple card accounts

Card3000 supports the use of multiple card accounts. Accessing the details of a different payment cardis as simple as swiping left or right on the interface to switch to another card account.

Accessing card transactions

After selecting a particular card account, swiping up will reveal the latest transactions that have beenmade with that card. A list of 5 of the latest transactions is displayed on the interface. Clicking on atransaction will show details associated with that transaction such as amount, merchant, transaction date,approval status, and options to report a fraudulent transaction.

Reporting a fraudulent transaction

If the card holder notices a fraudulent transaction, it can be reported by selecting transaction details andclicking the ‘report fraud’ button. This brings up an agreement notice and an action to report thetransaction to the bank. The interface also displays options to immediately block the account for furtheruse.

User interface description

Page 19: Card3000 - courses.cs.washington.edu

Step 1 ­ Authentication

The cardholder must authenticate himself by scanning his fingerprint through the authentication screen onCard3000. This is the first step to gain access to all other features on the card. The interface of the carddisplays an image of a fingerprint in portrait mode (Image 8.3.1 Top­Left). The card holder places histhumb on the card to authenticate. The system scans the fingerprint and if it identifies the user, it changesthe interface to display the default payment card details.

Step 2 ­ Select payment card

By default, Card3000 displays the default payment card details after authentication. This includes thecard name, card number, exp. date, account holder name, and payment networks (VISA,MC, AMEX,Discover, etc). There’s also an arrow on either side of the card to denote that swiping on the interfacewill bring up the next card account (Image 8.3.1 Top­Right).

Step 3 ­ Activating a card for payment

In order to activate the card for payment, the user swipes down on the selected payment card. Thisbrings up the card activation screen. The user clicks on the button ‘Activate for Pay’ (Image 8.3.1Bottom­Left). The card interface changes to display the card details as described in Step 2. It alsoshows a small lock icon at the top right corner to indicate that the card is in payment mode but has beenlocked to avoid showing sensitive account information (Image 8.3.1 Bottom­Right). The user can nowhand over the card to the cashier to complete the payment. Clicking on the lock icon takes the userback to Step 1 to ensure authentication before showing any additional card information.

Step 4 ­ View card transactions

To view the transactions of a particular card, the user first selects the particular card by swipingleft/right. A swipe on the card towards the top brings up a list of transactions. The interface shows 5 ofthe latest transactions that were made with that card (Image 8.3.2 Top­Right). To go back to the carddetails, the user can swipe down on the screen which will bring back the list of card accounts.

Step 5 ­ Transaction Details

To view transaction details, the user clicks on the transaction to view additional details. The cardinterface changes to display details such as the merchant name, transaction amount, date & time of thetransaction, bank approval status and options to report a fraudulent transaction (Image 8.3.2Center­Left).

Page 20: Card3000 - courses.cs.washington.edu

Step 6 ­ Report a fraudulent transaction

To report a fraudulent transaction, the user clicks on the ‘Report Fraud’ button. This changes theinterface to display a notice of the legal agreement required while reporting the fraud (Image 8.3.2Center­Right).

The user agrees and clicks on the ‘Report’ button. After reporting, the interface also displays a popupthat allows the user to block the card from further use (Image 8.3.2 Bottom).

Page 21: Card3000 - courses.cs.washington.edu

Three scenarios corresponding to tasks

Scenario 1 – Making a quick payment

Jason is always on the go. He travels a lot for work, and uses several cards for different purposes; hehas a company credit card, and several personal cards with various benefits. He likes to book his travelon an airline card to accumulate air miles, and he pays for gas using a special card that offers 3% cashback on all fuel purchases. Keeping all these cards straight is problematic, but carrying them all wouldbe just annoying. Instead, Jason leaves the cards and home and carries his Card3000, which gives himaccess to all these cards in one small package. When sitting at the office and booking a flight, he pullsout his Card3000 and flips through the interface to reveal his airline card. He reads the number off thecard and enters it into the booking site. Once on the way, he wants to pay for snacks at an airport. Hepulls out his Card3000, cycles through the registered payment methods, and chooses his company card.Once activated, he uses it as though it were a normal credit card, swiping it through the paymentterminal. Once at his destination, he needs to top up his rental car. He pulls up to a gas station, choosesthe gas rewards card on his Card3000, inserts it into the pump, and pays for fuel as he would with anormal card. With the Card3000 in his pocket, Jason has access to all of his payment methods in oneconvenient device, and there’s no need to haul around a wallet full of cards.

Scenario 2 – Overdraft protection

Susan is a shop­a­holic. She keeps a few active credit cards, and often rings them up close to theirlimits. Every so often, as she’s nearing the month’s end, she accidentally overspends on a given cardand it is declined at the store. This is a humiliating situation – nobody likes to be told their card isdeclined, and be forced to find another payment method on the spot. Recently, Susan traded herphysical cards for a Card3000. Now, as is about to make a purchase at the department, she unlocksthe Card3000, looks at the details of her default card, and checks its balance. If the card is too close toits limit, she can choose another one. This gives her the peace of mind of knowing that her card won’tbe declined, and it also helps to keep her on top of her spending habits by increasing her financialawareness.

Scenario 3 – Card Security

Kevin likes the benefits of credit cards (convenience, rewards, etc), but he really doesn’t trust them. Hehas a few cards, though he rarely carries them as he believes that they’re an inherently insecure liability.Instead, he typically carries cash and a debit card. Kevin’s new Card3000 may finally be the answer!His cards are now securely stored within the device, and can only be activated with his fingerprint.When he’s about to make a purchase, Kevin unlocks the Card3000 by placing his finger on the sensor.

Page 22: Card3000 - courses.cs.washington.edu

He is recognized as the card’s sole user and it unlocks the interface. He selects a payment card and thentaps the ‘Activate for Pay’ option. This place the Card3000 into a mode such that it can only be used asthe single card he selected; the details of that card are shown and the magnetic stripe is activated, but noother interactions with the device are possible. He hands the Card3000 to the teller who swipes itthrough the reader on the register and hands it back to Kevin. He then locks the card so that it cannotbe used for any further transactions, even if it’s stolen. Now Kevin can stop carrying so much cash, andstart earning reward points, all with the peace of mind of knowing that Card3000 is keeping his personaldata secure.

Following a purchase, Kevin likes to review his recent transactions to ensure that the correct amountwas billed. After paying for a $3.99 coffee with his Card3000, Kevin swipes up in the interface to seethe last 5 transactions on the card. He sees the $3.99 coffee purchase, which looks fine, but then healso something odd: a $62 transaction at a gas station. Knowing that he never uses this card for gas, andthat his car can’t even hold that much gas anyway, he realizes that this was a fraudulent transaction. Hetaps on the line item, and selects the “report fraud” option. The Card3000 notifies the credit company,and asks Kevin if he wants to freeze the card. He chooses “yes”, and that card number is immediatelyinactivated, protecting him from any more attempted theft.